Для опытных пользователей 5, Глоссарий 6 – Инструкция по эксплуатации ESET NOD32 Smart Security 6
Страница 4
.................................................................................82
.................................................................................83
.................................................................................83
.............................................................................84
.................................................................................85
.................................................................................86
.................................................................................88
.................................................................................89
.................................................................................90
.............................................................................91
.................................................................................91
.................................................................................92
........................................................................92
.................................................................................92
.................................................................................93
.............................................................................93
.................................................................................93
.................................................................................94
.................................................................................94
.................................................................................95
.................................................................................95
..................................................97
........................................................................97
........................................................................97
........................................................................98
........................................................................98
........................................................................99
Обнаружение в состоянии простоя
........................................................................99
.................................................................................99
.............................................................................99
.................................................................................100
Интерфейс пользователя и работа в
приложении
.............................................................................100
Элементы управления программой
.............................................................................101
...............................................................................102
.............................................................................104
.................................................................................105
.................................................................................105
.............................................................................106
.............................................................................106
.............................................................................108
.................................................................................109
.................................................................................110
ESET SysInspector как часть ESET Smart Security
........................................................................110
.................................................................................111
.................................................................................111
Создание компакт-диска аварийного
восстановления
.................................................................................111
.................................................................................112
.............................................................................112
.............................................................................112
Противовирусная программа ESET
.............................................................................113
.............................................................................113
.............................................................................113
.............................................................................113
.................................................................................114
.............................................................................114
........................................................................114
..................................................116
........................................................................116
.................................................................................116
.................................................................................116
.................................................................................116
.................................................................................117
.................................................................................117
.................................................................................117
.................................................................................118
.................................................................................118
Потенциально опасные приложения
.................................................................................118
Потенциально нежелательные приложения
........................................................................118
.................................................................................118
.................................................................................119
Атака путем подделки записей кэша DNS
.................................................................................119
.................................................................................119
.................................................................................119
.................................................................................120
.................................................................................120
........................................................................121
.................................................................................121
.................................................................................121
.................................................................................122
.................................................................................122
Распознавание мошеннических сообщений
.............................................................................122
.............................................................................123
.............................................................................123
.............................................................................123